
Computers 2e
Quiz
•
Computers
•
12th Grade
•
Easy
Akau Anyieth
Used 6+ times
FREE Resource
Enhance your content in a minute
50 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Question #201
Topic 1
A user reports a workstation has been performing strangely after a suspicious email was opened on it earlier in the week. Which of the following should the technician perform FIRST?
A. Escalate the ticket to Tier 2.
B. Run a virus scan.
C. Utilize a Windows restore point.
D. Reimage the computer.
Answer explanation
When a user reports unusual behavior on a workstation after opening a suspicious email, the first and most immediate step should be to run a virus scan to check for malware or malicious software. Running a virus scan will help identify and potentially remove any threats that might have been introduced through the suspicious email. Escalating the ticket, using a Windows restore point, or reimaging the computer can be considered as follow-up steps depending on the results of the virus scan and the severity of the issue, but running a virus scan is the initial action to take in this scenario to address potential security threats.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Question #202
Topic 1
Which of the following wireless security features can be enabled to allow a user to use login credentials to attach to available corporate SSIDs?
A. TACACS+
B. Kerberos
C. Preshared key
D. WPA2/AES
Answer explanation
Kerberos is a network authentication protocol that can be used to provide secure authentication for users connecting to corporate SSIDs (Service Set Identifiers) via wireless networks. It allows users to use login credentials to authenticate themselves securely on the network.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Question #203
Topic 1
Which of the following would MOST likely be used to change the security settings on a user's device in a domain environment?
A. Security groups
B. Access control list
C. Group Policy
D. Login script
Answer explanation
Group policy is used to change the security settings of users
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Question #204
Topic 1
Which of the following often uses an SMS or third-party application as a secondary method to access a system?
A. MFA
B. WPA2
C. AES
D. RADIUS
Answer explanation
Often websites, or web-application services will require a second step/method to login, most use SMS to quickly send a verification, if not, verification is often done through their self-provided, or trusted third party app authenticator.
Often websites, or web-application services will require a second step/method to login, most use SMS to quickly send a verification, if not, verification is often done through their self-provided, or trusted third party app authenticator.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Question #205
Topic 1
A technician needs to ensure that USB devices are not suspended by the operating system. Which of the following Control Panel utilities should the technician use to configure the setting?
A. System
B. Power Options
C. Devices and Printers
D. Device Manager
Answer explanation
Open the "Control Panel." Navigate to "Power Options." Click on the selected power plan (e.g., "Balanced" or "High Performance"). Click on "Change plan settings." Click on "Change advanced power settings." In the "Advanced settings" window, look for the "USB settings" category. Under "USB settings," you should find an option related to USB selective suspend. Set it to "Disabled." Click "Apply" and then "OK" to save the changes
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Question #206
Topic 1
A technician needs to manually set an IP address on a computer that is running macOS. Which of the following commands should the technician use?
A. ipconfig
B. ifconfig
C. arpa
D. ping
Answer explanation
If you enter the command “ifconfig” in the terminal, all information will be displayed. You can also use the commands “ip addr” or “ip a”. Confirm with [Enter]. You'll now be shown all IP addresses that are in your network
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Question #207
Topic 1
A user receives a call from someone who claims to be from the user's bank and requests information to ensure the user's account is safe. Which of the following social-engineering attacks is the user experiencing?
A. Phishing
B. Smishing
C. Whaling
D. Vishing
Answer explanation
Vishing, also known as Voice Phishing, is a social engineering attack where an attacker uses a phone call to impersonate a legitimate entity, such as a bank representative, government agency, or customer service representative. The attacker typically tries to manipulate the victim into revealing sensitive information, such as account numbers, passwords, or other personal information, by creating a sense of urgency or fear.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
45 questions
TryOut Ujian Sekolah Pengetahuan - TIK SMP N 1 JEPARA
Quiz
•
12th Grade
50 questions
Information Technology
Quiz
•
12th Grade
45 questions
Tin - 12 - ck1
Quiz
•
12th Grade
50 questions
Algoritmika 1.
Quiz
•
10th Grade - University
50 questions
Latihan ASAS TIK Kelas IX
Quiz
•
9th Grade - University
50 questions
Ôn tập KTGK2 Tin 11
Quiz
•
9th - 12th Grade
50 questions
Software de Licenciamento Livre
Quiz
•
12th Grade
50 questions
LATIHAN SOAL PTS GENAP KELAS 8
Quiz
•
11th - 12th Grade
Popular Resources on Wayground
8 questions
2 Step Word Problems
Quiz
•
KG - University
20 questions
Comparing Fractions
Quiz
•
4th Grade
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
10 questions
Latin Bases claus(clois,clos, clud, clus) and ped
Quiz
•
6th - 8th Grade
22 questions
fractions
Quiz
•
3rd Grade
7 questions
The Story of Books
Quiz
•
6th - 8th Grade
Discover more resources for Computers
8 questions
2 Step Word Problems
Quiz
•
KG - University
10 questions
Martin Luther King, Jr. For Kids
Interactive video
•
1st - 12th Grade
10 questions
Dr. King's Speech and Its Impact
Interactive video
•
7th - 12th Grade
20 questions
-AR -ER -IR present tense
Quiz
•
10th - 12th Grade
7 questions
Anti-Bullying ARS 15-341
Quiz
•
9th - 12th Grade
13 questions
Model Exponential Growth and Decay Scenarios
Quiz
•
9th - 12th Grade
15 questions
TSI Math Practice Questions
Quiz
•
8th - 12th Grade
24 questions
Identify Properties of Polygons and Quadrilaterals
Quiz
•
9th - 12th Grade
